Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
krüptograafia (subject term)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
90
Look more..
(1/1)
Export
export all inquiry results
(90)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
51
book article
Lattice-based threshold signature implementation for constrained devices
Dobias, Patrik
;
Ricci, Sara
;
Dzurenda, Petr
;
Malina, Lukas
;
Snetkov, Nikita
Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023). Vol. 1
2023
/
p. 724-730
https://doi.org/10.5220/0012112700003555
book article
52
book article
LiD-CAT: A lightweight detector for cache ATtacks
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, Mottaqiallah
;
Niazmand, Behrad
;
Ghasempouri, Tara
;
Raik, Jaan
;
Sepulveda, Johanna
2020 IEEE European Test Symposium (ETS) : ETS 2020, May 25-29, 2020 Tallinn, Estonia : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/ETS48528.2020.9131603
book article
53
book article
A lightweight Mmssage authentication code for virtual work in future smart cities
Pindar, Zahraddeen A.
;
Fayomi, Joshua O.
;
Waziri, Nazir H.
;
Abdulhamid, Bala M.
;
Jamel, Sapiee
2020 IEEE European Technology and Engineering Management Summit (E-TEMS), 5-7 March 2020, Dortmund University of Applied Sciences and Art
2020
/
5 p
https://doi.org/10.1109/E-TEMS46250.2020.9111859
book article
54
journal article
Liu, Feng; Yan, Wei Qi. Visual cryptography for image processing and security. Theory, methods, and applications. Cham: Springer. xvi, 143 p. (2014) : [review]
Henno, Jaak
Zentralblatt MATH
2015
/
[1] p
journal article
55
book article EST
/
book article ENG
Long-term secure commitments via extractable-binding commitments
Buldas, Ahto
;
Geihs, Matthias
;
Buchmann, Johannes
Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017 : Proceedings, Part I
2017
/
p. 65-81
https://doi.org/10.1007/978-3-319-60055-0_4
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
56
journal article
Martínez-Guerra, Rafael; Montesinos-García, Juan Javier; Flores-Flores, Juan Pablo. Encryption and decryption algorithms for plain text and images using fractional calculus : [review)
Henno, Jaak
Zentralblatt MATH
2024
/
1 p.
https://zbmath.org/1531.94002
journal article
57
journal article
Mittelbach, Arno; Fischlin, Marc.The theory of hash functions and random oracles. An approach to modern cryptography.
Henno, Jaak
zbMATH Open
2022
/
1 p.
https://zbmath.org/1490.94001
journal article
58
book article
Multiplierless design of high-speed very large constant multiplications
Aksoy, Levent
;
Roy, Debapriya Basu
;
Imran, Malik
;
Pagliarini, Samuel Nascimento
2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC 2024)
2024
/
p. 957-962
https://doi.org/10.1109/ASP-DAC58780.2024.10473954
book article
59
journal article EST
/
journal article ENG
Multiplierless design of very large constant multiplications in cryptography
Aksoy, Levent
;
Roy, Debapriya Basu
;
Imran, Malik
;
Karl, Patrick
;
Pagliarini, Samuel Nascimento
IEEE Transactions on Circuits and Systems II : Express Briefs
2022
/
p. 4503-4507
https://doi.org/10.1109/TCSII.2022.3191662
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
60
book article
A novel anonymous authentication and key agreement scheme for smart grid
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 357-362
https://doi.org/10.5220/0009824203570362
book article
61
book article
Oracle separation in the non-uniform model
Buldas, Ahto
;
Laur, Sven
;
Niitsoo, Margus
Provable Security : Third International Conference : ProvSec 2009 : Guangzhou, China, November 11-13, 2009 : proceedings
2009
/
p. 230-244
https://link.springer.com/content/pdf/10.1007/978-3-642-04642-1_19.pdf
book article
62
book article
PASCAL : timing SCA resistant design and verification flow
Lai, Xinhui
;
Jenihhin, Maksim
;
Raik, Jaan
;
Paul, Kolin
2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS 2019) : 1-3 July 2019, Greece
2019
/
p. 239-242 : ill
https://doi.org/10.1109/IOLTS.2019.8854458
book article
Related publications
1
Approaches to extra-functional verification of security and reliability aspects in hardware designs = Riistvaraprojektide turva- ja töökindlusaspektide ekstrafunktsionaalse verifitseerimise lähenemisviisid
63
journal article
Perera, Maharage Nisansala Sevwandi; Nakamura, Toru; Matsunaka, Takashi; Yokoyama, Hiroyuki; Sakurai, Kouichi Attribute based tracing for securing group signatures against centralized authorities : [review]
Henno, Jaak
Zentralblatt MATH
2024
/
1 p.
https://zbmath.org/1529.94039
journal article
64
book article
Post-quantum trails: an educational board game about post-quantum cryptography
Vakarjuk, Jelizaveta
;
Snetkov, Nikita
Proceedings of the 7th International Conference on Historical Cryptology (HistoCrypt 2024)
2024
/
p. 244-248 : ill
https://dspace.ut.ee/items/1e6331fb-6e1c-4374-a2c1-2ef2eab3190a
https://doi.org/10.58009/aere-perennius0115
book article
65
journal article
Prasad, Kalika; Mahato, Hrishikesh. Cryptography using generalized Fibonacci matrices with affine-Hill cipher : [review]
Henno, Jaak
Zentralblatt MATH
2023
/
1 p.
https://www.zbmath.org/1506.94060
journal article
66
book article EST
/
book article ENG
Privacy-preserving server-supported decryption
Laud, Peeter
;
Pankova, Alisa
;
Vakarjuk, Jelizaveta
2025 IEEE 38th Computer Security Foundations Symposium (CSF)
2025
/
p. 48-63
https://doi.org/10.1109/CSF64896.2025.00004
https://www.computer.org/csdl/proceedings-article/csf/2025/108100a004/26w6qxiaHO8
book article EST
/
book article ENG
67
book article
Reflection, rewinding, and coin-toss in EasyCrypt
Firsov, Denis
;
Unruh, Dominique
CPP 2022 - Proceedings of the 11th ACM SIGPLAN International Conference on Certified Programs and Proofs, co-located with POPL 2022
2022
/
p. 166-179
https://doi.org/10.1145/3497775.3503693
book article
68
journal article
Salastus avatud süsteemides
Praust, Valdo
Arvutimaailm
1997
/
8, lk. 47-48
journal article
69
book article EST
/
book article ENG
Security proofs for hash tree time-stamping using hash functions with small output size
Buldas, Ahto
;
Laanoja, Risto
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 235-250 : ill
https://doi.org/10.1007/978-3-642-39059-3_16
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
70
dissertation
Security protocols analysis in the computational model - dependency flow graphs-based approach = Turvaprotokollide analüüs arvutuslikul mudelil - sõltuvusgraafidel põhinev lähenemisviis
Tšahhirov, Ilja
2008
https://www.ester.ee/record=b2449152*est
dissertation
71
book article EST
/
book article ENG
Server-supported decryption for mobile devices
Kirss, Johanna Maria
;
Laud, Peeter
;
Snetkov, Nikita
;
Vakarjuk, Jelizaveta
Security and Trust Management : 18th International Workshop, STM 2022 Copenhagen, Denmark, September 29, 2022 : proceedings
2023
/
p. 71-81
https://doi.org/10.1007/978-3-031-29504-1_4
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
72
book article EST
/
book article ENG
Server-supported RSA signatures for mobile devices
Buldas, Ahto
;
Kalu, Aivo
;
Laud, Peeter
;
Oruaas, Mart
Computer Security - ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11–15, 2017 : proceedings, part I
2017
/
p. 315-333 : ill
https://doi.org/10.1007/978-3-319-66402-6_19
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
73
journal article
Song, Wei; Zheng, Yu; Fu, Chong; Shan, Pufang. A novel batch image encryption algorithm using parallel computing : [review]
Henno, Jaak
Zentralblatt MATH
2020
/
1 p
https://www.zbmath.org/?q=an:07333047
journal article
74
journal article EST
/
journal article ENG
SSProve : a foundational framework for modular cryptographic proofs in Coq
Haselwarter, Philipp G.
;
Rivas, Exequiel
;
Van Muylder, Antoine
;
Winterhalter, Théo
;
Abate, Carmine
;
Sidorenco, Nikolaj
;
Hriţcu, Cǎtǎlin
;
Maillard, Kenji
;
Spitters, Bas
ACM Transactions on Programming Languages and Systems
2023
/
art. 15
https://doi.org/10.1145/3594735
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
75
journal article
A systematic study of lattice-based NIST PQC algorithms : from reference implementations to hardware accelerators
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
arXiv.org
2020
/
36 p. : ill
journal article
Number of records 90, displaying
51 - 75
previous
1
2
3
4
next
subject term
1
1.
krüptograafia
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT